Business Continuity / Disaster Recovery

The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.

It’s here. After months of planning and preparation you should now be prepared for the implementation of the General Data Protection Regulations. This BrightTALK special Summit will focus on the three pillars of GDPR: protection, compliance and response. We’ve arranged the leading speakers from the industry to give their insights into the steps that you need to take to ensure you’re fully up to speed.

Cybercrime inevitably increases year-in-year-out, as the value of stolen data rises exponentially in value, so is there anything that you can do to fight the cyber criminals? This 3 day Summit will feature industry-leading security thinkers discussing the prominent areas that you should be concentrating on. Ransomware, DDoS, Social engineering and more will be covered as our experts give advice on staying secure and protected in 2018.

With 3 months to go the countdown to GDPR is ramping up. There’s expectation from across the company that you’ll be ready and the organisation will compliant and ready to react, but will that be the case? Join us for our GDPR special Summit where our invited experts will be discussing the impact and influence of the legislation along with suggesting the steps you need to take to be confident and prepared when May rolls around.

The biggest cyber attacks and breaches that disrupted enterprises, organizations and governments worldwide in 2017 underscore the importance of network, endpoint, and application monitoring. As attacks are getting more sophisticated, more frequent and the line between cybercrime and cyberwar blurs, businesses should put cybersecurity a key priority in 2018. The world’s top security experts will discuss advanced cybersecurity, from trends and long-term strategy, through AI-powered technology and execution.

In November 2017, Uber disclosed that hackers accessed the personal data of its 57 million users and drivers. This massive data breach occurred in October 2016 and was kept secret for over a year. How does this breach affect you and your organization? What should companies do to combat insider threats and breaches? Top cyber security experts will discuss the broader implications of this breach and the lessons for CISO's as we prepare for 2018.

Take look back at the costliest attacks and the most newsworthy breaches of 2017. Who or what has been to blame and what lessons can you the security professionals take from the year? Hear from the top industry experts as they review this past year’s threatscape and discuss what you need to do address today’s key vulnerabilities in 2018.

Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches. Hear from expert thought leaders as they discuss the key opportunities that the cloud brings, whilst also covering the risks that continue to foster mistrust.

Equifax disclosed a massive cybersecurity breach in early September, in which the personal information of as many as 143 million Americans, almost half the country, was compromised.
Top cyber security leaders and researchers will discuss the impact of this breach on individuals and organizations of all sizes.

A massive cyber attack in late June 27, 2017 disrupted the operations of major banks, utilities, power plants and government agencies in the Ukraine. The attack quickly spread to other countries. Initially called Petya, then NotPetya, was this a ransomware attack, a wiper or an act of cyber warfare?Join the conversations as security leaders, engineers and researchers discuss the large-scale implications of the attack and how to prepare against similar attacks in the future.

Over 150 million connected cars are expected on the roads and smart cities will house 9.7 billion connected devices by 2020, according to Gartner. With the increased adoption of Internet-connected devices come new opportunities for hackers to launch attacks on unprecedented scale and impact. The attack surface and threats have changed. How is cybersecurity keeping up? Listen to leading experts as they discuss the security implications for the Internet of Everything and how we need to prepare.